<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Denied ICMP type=0 ... : no matching session in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/denied-icmp-type-0-no-matching-session/m-p/2672308#M194341</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;I am unable to get a ping response from a host whose gateway address is the ASA and it’s configured on an another VLAN. Note that connect to the host on other protocols i.e. RDP, HTTP, 23 etc.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;Topology is something like this.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;My desktop is connected to a Layer3 switch and the office has it’s own local internet breakout. All traffic points back to my core switch which has a default gateway of SonicWall. There is a SHDS connecting Office A to Office B where my VMWare stack is. VLAN1 &amp;amp; 2 are spanned over this SHDS and I have hosts sitting on VLAN1&amp;amp;2 at both sites. Site B has an ASA and it also has a local internet breakout which is working fine.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p2"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;Problem:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI class="p1"&gt;&lt;SPAN class="s1"&gt;HostX at site B is configured on VLAN1 and I have a desktop-HostY at site A on VLAN1 as well. I am able to ping HostX from HostY and I can access all resources like RDP, HTTP, SSH etc.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI class="p1"&gt;&lt;SPAN class="s1"&gt;HostX at site B is configured on &lt;STRONG&gt;VLAN2 &lt;/STRONG&gt;and I have a desktop-HostY at site A on &lt;STRONG&gt;VLAN1,3,4,5&lt;/STRONG&gt;. I am &lt;B&gt;unable&lt;/B&gt; to ping HostX from HostY but I can access all resources like RDP, HTTP, SSH etc.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Note that HostX’s default gateway is the ASA at site B.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p2"&gt;&lt;STRONG&gt;Configuration applied so far:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI class="p1"&gt;&lt;SPAN class="s1"&gt;configured tcp-statebypass on VLAN1 and VLAN2 for the whole corporate range i.e. 10.0.0.0/8 to 10.0.0.0/8 tcp-statebypass&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI class="p1"&gt;Intra traffic between two same security level interfaces is enabled&lt;/LI&gt;&lt;LI class="p1"&gt;Enable traffic between two or more hosts connected to the same interface.&lt;/LI&gt;&lt;LI class="p1"&gt;&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;Is there any this which i have missed which could be denying icmp requests&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 06:10:44 GMT</pubDate>
    <dc:creator>itops</dc:creator>
    <dc:date>2019-03-12T06:10:44Z</dc:date>
    <item>
      <title>Denied ICMP type=0 ... : no matching session</title>
      <link>https://community.cisco.com/t5/network-security/denied-icmp-type-0-no-matching-session/m-p/2672308#M194341</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;I am unable to get a ping response from a host whose gateway address is the ASA and it’s configured on an another VLAN. Note that connect to the host on other protocols i.e. RDP, HTTP, 23 etc.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;Topology is something like this.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;My desktop is connected to a Layer3 switch and the office has it’s own local internet breakout. All traffic points back to my core switch which has a default gateway of SonicWall. There is a SHDS connecting Office A to Office B where my VMWare stack is. VLAN1 &amp;amp; 2 are spanned over this SHDS and I have hosts sitting on VLAN1&amp;amp;2 at both sites. Site B has an ASA and it also has a local internet breakout which is working fine.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p2"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;Problem:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI class="p1"&gt;&lt;SPAN class="s1"&gt;HostX at site B is configured on VLAN1 and I have a desktop-HostY at site A on VLAN1 as well. I am able to ping HostX from HostY and I can access all resources like RDP, HTTP, SSH etc.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI class="p1"&gt;&lt;SPAN class="s1"&gt;HostX at site B is configured on &lt;STRONG&gt;VLAN2 &lt;/STRONG&gt;and I have a desktop-HostY at site A on &lt;STRONG&gt;VLAN1,3,4,5&lt;/STRONG&gt;. I am &lt;B&gt;unable&lt;/B&gt; to ping HostX from HostY but I can access all resources like RDP, HTTP, SSH etc.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Note that HostX’s default gateway is the ASA at site B.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p2"&gt;&lt;STRONG&gt;Configuration applied so far:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI class="p1"&gt;&lt;SPAN class="s1"&gt;configured tcp-statebypass on VLAN1 and VLAN2 for the whole corporate range i.e. 10.0.0.0/8 to 10.0.0.0/8 tcp-statebypass&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI class="p1"&gt;Intra traffic between two same security level interfaces is enabled&lt;/LI&gt;&lt;LI class="p1"&gt;Enable traffic between two or more hosts connected to the same interface.&lt;/LI&gt;&lt;LI class="p1"&gt;&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;Is there any this which i have missed which could be denying icmp requests&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:10:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-icmp-type-0-no-matching-session/m-p/2672308#M194341</guid>
      <dc:creator>itops</dc:creator>
      <dc:date>2019-03-12T06:10:44Z</dc:date>
    </item>
    <item>
      <title>Can you try following command</title>
      <link>https://community.cisco.com/t5/network-security/denied-icmp-type-0-no-matching-session/m-p/2672309#M194343</link>
      <description>&lt;P&gt;Can you try following command:&lt;/P&gt;&lt;P&gt;# fixup protocol icmp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If it does not help then try applying asp captures and check why ASA is dropping the traffic and share the details.&lt;/P&gt;&lt;P&gt;Command for asp capture:&lt;/P&gt;&lt;P&gt;cap asp-drop type asp-drop all&lt;/P&gt;&lt;P&gt;show cap asp-drop | include &amp;lt;source_ip of host&amp;gt;&lt;/P&gt;&lt;P&gt;remove captures:&lt;/P&gt;&lt;P&gt;no cap asp-drop.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope it helps!!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jun 2015 19:07:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-icmp-type-0-no-matching-session/m-p/2672309#M194343</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-06-24T19:07:25Z</dc:date>
    </item>
    <item>
      <title>Hi Risseth, fixup protocol</title>
      <link>https://community.cisco.com/t5/network-security/denied-icmp-type-0-no-matching-session/m-p/2672310#M194344</link>
      <description>&lt;P&gt;Hi Risseth,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;fixup protocol icmp did not resolve the issue. Capture from ASA below&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;show cap asp-drop | include 10.0.60.235&lt;BR /&gt;&amp;nbsp; 43: 09:49:46.336698 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply Drop-reason: (inspect-icmp-seq-num-not-matched) ICMP Inspect seq num not matched&lt;BR /&gt;&amp;nbsp;100: 09:49:47.343289 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;&amp;nbsp;161: 09:49:48.343121 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;&amp;nbsp;237: 09:49:49.346997 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;&amp;nbsp;308: 09:49:50.351468 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;&amp;nbsp;381: 09:49:51.351468 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;&amp;nbsp;451: 09:49:52.355648 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;&amp;nbsp;531: 09:49:53.359310 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;&amp;nbsp;600: 09:49:54.362942 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;&amp;nbsp;655: 09:49:55.367794 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;&amp;nbsp;710: 09:49:56.370494 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;&amp;nbsp;779: 09:49:57.372905 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;&amp;nbsp;852: 09:49:58.375255 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;&amp;nbsp;915: 09:49:59.376185 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;&amp;nbsp;988: 09:50:00.380885 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;1060: 09:50:01.382319 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;1139: 09:50:02.383174 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;1222: 09:50:03.397531 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;1295: 09:50:04.388377 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;1359: 09:50:05.392206 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;1430: 09:50:06.395258 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;1504: 09:50:07.396936 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;1563: 09:50:08.399362 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;1638: 09:50:09.401529 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;1705: 09:50:10.407037 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;1778: 09:50:11.412240 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;1842: 09:50:12.411096 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;1882: 09:50:13.009765 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#1 P0 10.0.60.235.61854 &amp;gt; 10.0.0.254.443: F 292292983:292292983(0) ack 2856598740 win 65535 &amp;lt;nop,nop,timestamp 1175996431 4124391004&amp;gt;&lt;BR /&gt;1921: 09:50:13.413018 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;2000: 09:50:14.414742 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;2072: 09:50:15.418816 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;2152: 09:50:16.422768 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;2237: 09:50:17.426186 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;2308: 09:50:18.425881 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;2387: 09:50:19.426216 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;2463: 09:50:20.431236 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;2525: 09:50:21.435890 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;2589: 09:50:22.438804 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;2669: 09:50:23.442314 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;2749: 09:50:24.449958 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;BR /&gt;2819: 09:50:25.449470 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#2 P0 10.0.2.49 &amp;gt; 10.0.60.235: icmp: echo reply&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jun 2015 08:52:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-icmp-type-0-no-matching-session/m-p/2672310#M194344</guid>
      <dc:creator>itops</dc:creator>
      <dc:date>2015-06-25T08:52:05Z</dc:date>
    </item>
    <item>
      <title>Hi,inspect-icmp-seq-num-not</title>
      <link>https://community.cisco.com/t5/network-security/denied-icmp-type-0-no-matching-session/m-p/2672311#M194345</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;DIV id="stcpDiv" style="position: absolute; top: -1999px; left: -1988px;"&gt;inspect-icmp-seq-num-not-matched)&lt;/DIV&gt;&lt;P&gt;From asp drops it is clear that ASA is seeing different sequence number in the reply than the request.&lt;/P&gt;&lt;P&gt;Now you should take captures on the ingress and egress interface to compare the sequence number of the ICMP request and replies.&lt;/P&gt;&lt;P&gt;If the sequence numbers are changing in icmp reply, then you should check why the target machine is sending wrong packets.&lt;/P&gt;&lt;P&gt;You can also try ping test for different source and destination.&lt;/P&gt;&lt;P&gt;Share the details of ICMP captures and also collect multiple output of command with pings flowing in network.&lt;/P&gt;&lt;P&gt;show service-policy | in icmp&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;R.Seth&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jun 2015 10:32:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-icmp-type-0-no-matching-session/m-p/2672311#M194345</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-06-25T10:32:28Z</dc:date>
    </item>
    <item>
      <title>Hi. What version of ASA are</title>
      <link>https://community.cisco.com/t5/network-security/denied-icmp-type-0-no-matching-session/m-p/2672312#M194347</link>
      <description>&lt;P&gt;Hi. What version of ASA are you running?&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jun 2015 11:02:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-icmp-type-0-no-matching-session/m-p/2672312#M194347</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-06-25T11:02:43Z</dc:date>
    </item>
  </channel>
</rss>

